Enterprise IT Watch Blog:

August, 2010


August 17, 2010  4:12 PM

Why storage’s ‘safe vendors’ shouldn’t be



Posted by: Guest Author
Guest Post, Storage in 2010

Think you've made a safe storage decision by going with a trusted name? Think again. Today's guest post is from Roger Kelley, aka @storage_wonk, who is the principal architect at Xiotech,...

August 17, 2010  6:00 AM

ITKE responds: IT career planning, in your own words



Posted by: MelanieYarbrough
Careers

Here at ITKnowledgeExchange.com, one of the evergreen questions we see in the IT answers forum is the recent IT grad asking for advice on what to do next. With so many possible certifications and...


August 12, 2010  2:12 PM

Endpoint security leaks from our very own members



Posted by: MelanieYarbrough
Security

A couple weeks ago, I read an article over at Tech News World that got me thinking about endpoint security, and how it has become like a spy movie, where...


August 10, 2010  8:02 AM

Planning for Success: How to build the perfect .11n network bit by byte



Posted by: MelanieYarbrough
.11n, Wireless in 2010

It's the interior design of IT enterprise, but someone has to do it....


August 4, 2010  1:49 PM

802.11n: Not If, Not When – It’s Now



Posted by: Guest Author
.11n, Wireless in 2010

Wondering when you should update your wireless network from scattered unsecured "hotspots" to something a little more ... serious? Then you've been wondering a little too long, according to today's guest author Craig Mathias. Mathias is a Principal with the wireless and mobile advisory firm...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: